Various open-source benchmarks by the Phoronix Test Suite v9.8.0 (Nesodden).
Processor: Intel Core i7-4700HQ @ 3.40GHz (4 Cores / 8 Threads), Motherboard: ASUS G750JX v1.0 (G750JX.206 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Seagate ST1000LM024 HN-M + 256GB LITEONIT LCM-256, Graphics: ASUS NVIDIA GeForce GTX 770M 3GB, Audio: Realtek ALC3229, Network: Qualcomm Atheros QCA8171 + Broadcom BCM4352 802.11ac
OS: Arch rolling, Kernel: 5.9.8-arch1-1 (x86_64), Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, Compiler: GCC 10.2.0 + Clang 11.0.0Target:, File-System: btrfs, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x8
Python Notes: Python 3.8.6
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
A simple, compressed, fast and persistent data store library for C. Learn more via the OpenBenchmarking.org test page.
This test measures the time needed to carry out some sample Git operations on an example, static repository that happens to be a copy of the GNOME GTK tool-kit repository. Learn more via the OpenBenchmarking.org test page.
This is a test of rays1bench, a simple path-tracer / ray-tracing that supports SSE and AVX instructions, multi-threading, and other features. This test profile is measuring the performance of the "large scene" in rays1bench. Learn more via the OpenBenchmarking.org test page.
This test performs a bayesian analysis of a set of primate genome sequences in order to estimate their phylogeny. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-4700HQ @ 3.40GHz (4 Cores / 8 Threads), Motherboard: ASUS G750JX v1.0 (G750JX.206 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Seagate ST1000LM024 HN-M + 256GB LITEONIT LCM-256, Graphics: ASUS NVIDIA GeForce GTX 770M 3GB, Audio: Realtek ALC3229, Network: Qualcomm Atheros QCA8171 + Broadcom BCM4352 802.11ac
OS: Arch rolling, Kernel: 5.9.8-arch1-1 (x86_64), Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, Compiler: GCC 10.2.0 + Clang 11.0.0Target:, File-System: btrfs, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x8
Python Notes: Python 3.8.6
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 15 November 2020 21:14 by user rathel.